One in seven people in the world use online social networking for a variety of purposes -- to keep in touch with friends and family, to share special occasions, to broadcast announcements, and more. The majority of society has been bought into this new era of communication technology, which allows everyone on the internet to share information with friends. Since social networking has rapidly become a main form of communication, holes in privacy have become apparent. It has come to the point that the whole concept of sharing information requires restructuring.
Security administration is an uphill task to implement in an enterprise network providing secured corporate services. With the slew of patches being released by Microsoft, HP and other vendors, system administrators require a barrage of tools for analyzing the risk due to these vulnerabilities. In addition to this, criticalities in patching some end hosts (eg., in hospitals) raises serious security issues about the network to which the end hosts are connected.
Meteorological and hydrological sensors deployed over several hundred kilometers of geographical area comprise an environmental sensor network. Large amounts of data need to be processed in minimal time and transmitted over the available low speed and low bandwidth links. This paper describes algorithms for optimal data collection and data fusion. An inductive model using exponential back-off policy is used to collect optimal amount of data.
Many enterprises are currently are contemplating on moving from traditional phone service to VoIP. Since VoIP isn't inherently secure, it is necessary for companies to strongly consider what can be done to secure VoIP communications. This project deals with four areas that enterprises need to address to provide a complete and secure VoIP setup.
1) Constructing a secured SSL/TLS based proxy server.
2) Configuration VoIP traversal through the existing firewall / NAT
3) Placing VoIP equipment on a separate VLAN from the rest of the network
Voice over IP (VoIP) telephony is emerging as an alternative to traditional public switched telephone systems (PSTN) all over the world. Currently VoIP and PSTN interoperate with each other, where a signal that begins in one may go overa series of VoIP or PSTN network and end up in a destination situated in either one of them. Conversely, liberalization of PSTN networks and growing acceptance of SIGTRAN protocol suite have introduced new and yet to be trusted signaling entities. Thus security threats emerging from one network not only affects itself but other network also.